CN106971123B - A kind of terminal interface display methods and mobile terminal - Google Patents

A kind of terminal interface display methods and mobile terminal Download PDF

Info

Publication number
CN106971123B
CN106971123B CN201710191969.5A CN201710191969A CN106971123B CN 106971123 B CN106971123 B CN 106971123B CN 201710191969 A CN201710191969 A CN 201710191969A CN 106971123 B CN106971123 B CN 106971123B
Authority
CN
China
Prior art keywords
application
peep
proof
target
interface
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710191969.5A
Other languages
Chinese (zh)
Other versions
CN106971123A (en
Inventor
张健钦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vivo Mobile Communication Co Ltd
Original Assignee
Vivo Mobile Communication Co Ltd
Vivo Mobile Communication Co Ltd Beijing Branch
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vivo Mobile Communication Co Ltd, Vivo Mobile Communication Co Ltd Beijing Branch filed Critical Vivo Mobile Communication Co Ltd
Priority to CN201710191969.5A priority Critical patent/CN106971123B/en
Publication of CN106971123A publication Critical patent/CN106971123A/en
Application granted granted Critical
Publication of CN106971123B publication Critical patent/CN106971123B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • G06F21/84Protecting input, output or interconnection devices output devices, e.g. displays or monitors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/04812Interaction techniques based on cursor appearance or behaviour, e.g. being affected by the presence of displayed objects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0487Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser
    • G06F3/0488Interaction techniques based on graphical user interfaces [GUI] using specific features provided by the input device, e.g. functions controlled by the rotation of a mouse with dual sensing arrangements, or of the nature of the input device, e.g. tap gestures based on pressure sensed by a digitiser using a touch-screen or digitiser, e.g. input of commands through traced gestures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04803Split screen, i.e. subdividing the display area or the window area into separate subareas
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2203/00Indexing scheme relating to G06F3/00 - G06F3/048
    • G06F2203/048Indexing scheme relating to G06F3/048
    • G06F2203/04804Transparency, e.g. transparent or translucent windows
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2125Just-in-time application of countermeasures, e.g., on-the-fly decryption, just-in-time obfuscation or de-obfuscation

Abstract

A kind of terminal interface display methods of present invention offer and mobile terminal, are related to the communications field.This method includes determining the peep-proof instruction of triggering;It is instructed according to the peep-proof, starts peep-proof pattern, and obtain the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Wherein, first application is foreground application, and second application is the last application being activated in background application, and the target peep-proof display parameters are used for characterizing the display parameters after the interface overlapping of first application and second application;According to the target peep-proof display parameters, the display interface of adjustment first application and second application.The solution of the present invention solves the problems, such as existing the electric quantity consumption of mobile terminal can be caused to accelerate using peep-proof film peep-proof.

Description

A kind of terminal interface display methods and mobile terminal
Technical field
The present invention relates to field of communication technology, more particularly to a kind of terminal interface display methods and mobile terminal.
Background technology
With the development of technology, the function of mobile terminal is more and more abundant, brings great convenience to people’s lives, Mobile terminal can be used anywhere or anytime by realizing user.But when user is in public place, such as subway, public transport On, user often has found that there are some passerbys at one's side is watching the aobvious of oneself mobile terminal screen when operating mobile terminal Show content.Privacy concern, the capsule information for checking company or reply are exchanged with relatives and friends in particular, may be at this time Situations such as urgent secret mail, if by other people watch to, it will cause to increase the problem of divulging a secret risk.
Currently, existing mode is to stick on peep-proof film on the display screen of mobile terminal, to avoid being examined by passerby around See screen display content.However, " peep-proof film ", while increasing user's overhead, since its color is black, meeting is bright It is aobvious to reduce screen intensity, to meet viewing demand of the user to screen intensity, then corresponding height-regulating screen intensity is needed, to make The problem of accelerating at the electric quantity consumption of mobile terminal.
Invention content
A kind of terminal interface display methods of offer of the embodiment of the present invention and mobile terminal, to solve caused by sticking on peep-proof film The problem of electric quantity consumption of mobile terminal accelerates.
In a first aspect, providing a kind of terminal interface display methods, it is applied to mobile terminal, the method includes:
Determine the peep-proof instruction of triggering;
It is instructed according to the peep-proof, starts peep-proof pattern, and obtain corresponding first application and second in the peep-proof pattern The target peep-proof display parameters of application;Wherein, it is described first application be foreground application, it is described second application be background application in most The nearly application being once activated, the target peep-proof display parameters are used for characterizing the boundary of first application and second application Display parameters after the overlapping of face;
According to the target peep-proof display parameters, the display interface of adjustment first application and second application.
Second aspect provides a kind of mobile terminal, including:
Determining module, the peep-proof instruction for determining triggering;
First processing module, for according to the peep-proof instruct, start peep-proof pattern, and obtain it is right in the peep-proof pattern Answer the target peep-proof display parameters of the first application and the second application;Wherein, first application is foreground application, and described second answers With for the last application being activated in background application, the target peep-proof display parameters be used for characterizing first application and Display parameters after the interface overlapping of second application;
Module is adjusted, for according to the target peep-proof display parameters, adjustment first application and described second to be applied Display interface.
The above-mentioned technical proposal of the present invention has the beneficial effect that:
The terminal interface display methods of the embodiment of the present invention can answer user demand to open after determining the peep-proof instruction of triggering Dynamic peep-proof pattern corresponds to the last application two being activated in foreground application and background application by obtaining in the peep-proof pattern The target peep-proof display parameters of application, to adjust the display interface of the two applications, since the target peep-proof display parameters are tables Therefore mobile terminal screen display interface can be realized after the adjustment by levying the display parameters after the interface overlapping of the two applications Blurring effect has carried out peep-proof protection to the individual privacy of user, just without sticking on peep-proof film in screen, and then avoids electricity The acceleration of amount consumes.
Description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, needed in being described below to the embodiment of the present invention Attached drawing to be used is briefly described, it should be apparent that, drawings in the following description are only some embodiments of the invention, For those of ordinary skill in the art, without having to pay creative labor, it can also obtain according to these attached drawings Obtain other attached drawings.
Fig. 1 is the step flow chart of the terminal interface display methods of first embodiment of the invention;
Fig. 2 is the step flow chart of the terminal interface display methods of second embodiment of the invention;
Fig. 3 is the structural schematic diagram one of the mobile terminal of third embodiment of the invention;
Fig. 4 is the structural schematic diagram two of the mobile terminal of third embodiment of the invention;
Fig. 5 is the structural schematic diagram three of the mobile terminal of third embodiment of the invention;
Fig. 6 is the structural schematic diagram of the mobile terminal of fourth embodiment of the invention;
Fig. 7 is the structural schematic diagram of the mobile terminal of fifth embodiment of the invention.
Specific implementation mode
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation describes, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained without creative efforts Example, shall fall within the protection scope of the present invention.
First embodiment
As shown in Figure 1, the terminal interface display methods of first embodiment of the invention, is applied to mobile terminal, including:
Step 101, the peep-proof instruction of triggering is determined.
In this step, need to carry out mobile terminal payment in public places for such as user, when needing to prevent Password Input The case where being known by other people will be instructed, and then understand after triggering peep-proof instruction by the peep-proof for starting peep-proof pattern To the demand of user, to carry out subsequent processing.
Step 102, it is instructed according to the peep-proof, starts peep-proof pattern, and obtained correspondence first in the peep-proof pattern and answer With the target peep-proof display parameters with the second application;Wherein, first application is foreground application, and second application is backstage The last application being activated in, the target peep-proof display parameters are used for characterizing first application and described second Display parameters after the interface overlapping of application.
In this step, is instructed according to the peep-proof that step 101 determines, i.e., can start peep-proof pattern, and obtain the peep-proof mould It is shown in formula for adjusting the target peep-proof of the interface display of the last application being activated in foreground application and background application Parameter, the interface display to carry out peep-proof are arranged.Wherein, foreground application i.e. first is applied, and application interface is currently displaying; The last application i.e. the second application being activated, is the application being activated in background application, but second application is currently Be not activated state, and application interface is not also shown currently.Obtaining the boundary for characterizing the first application and the second application After display parameters after the overlapping of face, you can execute next step.
Step 103, according to the target peep-proof display parameters, the display of adjustment first application and second application Interface.
In this step, starting peep-proof pattern through step 102, and it is anti-to get pre-set target in the peep-proof pattern After peeping display parameters, the display interface of the first application and the second application is just adjusted according to the target peep-proof display parameters, so that It is finally shown as the effect of the blurring of peep-proof pattern setting, achievees the purpose that peep-proof.
In this way, through above-mentioned steps 101- steps 103, by determining that the peep-proof of triggering instructs, it is thus understood that after user needs, It will be based on peep-proof instruction and start peep-proof pattern, and obtain the target of corresponding first application and the second application in the peep-proof pattern Peep-proof display parameters, and then the tune for the display interface for completing to apply the first application and second according to the target peep-proof display parameters It is whole.First application is foreground application, and the second application is the last application being activated in background application, and the target peep-proof is aobvious Show that parameter is therefore to use the mesh for characterizing the display parameters after the interface of first application and second application is overlapped After marking the adjustment that peep-proof display parameters carry out display interface, interface that mobile terminal screen show is based on the first application interface and the The overlapping of two application interfaces will present the effect of blurring, to ensure the safety of individual privacy, and without sticking on peep-proof Film avoids the problem of mobile terminal electric quantity consumption accelerates.
Such as need to carry out the scene of mobile terminal payment, user to enter password after starting Mobile banking in public places Input interface does not remove input password, but (Mobile banking enters running background shape to deactivation another application such as browser State), and trigger peep-proof instruction.In this way, applying the mobile terminal of first embodiment of the invention, the anti-of user's triggering is being determined It can start peep-proof pattern after peeping instruction, and obtain and correspond to browser (first apply) and Mobile banking (the in the peep-proof pattern Two application) target peep-proof display parameters, in this way, be based on the target peep-proof display parameters, complete browser interface and mobile phone silver The blurring of row interface for password input shows that other staff can not both see the particular content that mobile terminal screen is shown clearly, for The subsequent input password of user can not also recognize its specific purposes, protect the privacy of user.
In this scenario, browser interface be in order to protect Mobile banking interface, therefore, after starting peep-proof pattern, According to the target peep-proof display parameters of acquisition, when adjusting display interface of the browser with the Mobile banking, to reach more preferably Effect optionally first the interface size based on the Mobile banking in running background, adaptation can adjust the current interface of browser Size, display interface that is two interfaces are completely overlapped, and then being adjusted by the target peep-proof display parameters, reaches after overlapping To scheduled blurring effect, the purpose of peep-proof is realized.
Certainly, the size of the second application interface is specifically adjusted based on the size of the first application interface, or with The size of the first application interface is adjusted based on the size of second application interface, can be based on itself in peep-proof pattern by user Operating habit pre-sets content to determine, is not limited to above-mentioned realization method.
In conclusion the method for first embodiment of the invention will apply family after determining the peep-proof instruction of user's triggering Demand starts peep-proof pattern, corresponds to what the last time in foreground application and background application was activated in the peep-proof pattern by obtaining Using the target peep-proof display parameters of two applications, to adjust the interface display of the two applications, join since the target peep-proof is shown Therefore number is the display parameters after characterizing the interface overlapping that the two are applied can realize that mobile terminal screen is shown after the adjustment The blurring effect at interface has carried out peep-proof protection to the individual privacy of user, just without sticking on peep-proof film in screen, and then keeps away The acceleration consumption of electricity is exempted from.
Second embodiment
As shown in Fig. 2, the terminal interface display methods of second embodiment of the invention, is applied to mobile terminal, including:
Step 201, the peep-proof instruction of triggering is determined.
In this step, need to carry out mobile terminal payment in public places for such as user, when needing to prevent Password Input The case where being known by other people will be instructed, and then understand after triggering peep-proof instruction by the peep-proof for starting peep-proof pattern To the demand of user, to carry out subsequent processing.
Step 202, it is instructed according to the peep-proof, starts peep-proof pattern, and obtained correspondence first in the peep-proof pattern and answer With the target peep-proof display parameters with the second application;Wherein, first application is foreground application, and second application is backstage The last application being activated in, the target peep-proof display parameters are used for characterizing first application and described second Display parameters after the interface overlapping of application.
In this step, is instructed according to the peep-proof that step 201 determines, i.e., can start peep-proof pattern, and obtain the peep-proof mould It is shown in formula for adjusting the target peep-proof of the interface display of the last application being activated in foreground application and background application Parameter, the interface display to carry out peep-proof are arranged.Wherein, foreground application i.e. first is applied, and application interface is currently displaying; The last application i.e. the second application being activated, is the application being activated in background application, but second application is currently Be not activated state, and application interface is not also shown currently.Obtaining the boundary for characterizing the first application and the second application After display parameters after the overlapping of face, you can execute next step.
Step 203, according to the target peep-proof display parameters, the display of adjustment first application and second application Interface.
In this step, starting peep-proof pattern through step 202, and it is anti-to get pre-set target in the peep-proof pattern After peeping display parameters, the display interface of the first application and the second application is just adjusted according to the target peep-proof display parameters, so that It is finally shown as the effect of the blurring of peep-proof pattern setting, achievees the purpose that peep-proof.
But after through step 203, the current display interface of mobile terminal has been in blurring, so being used to realize Further operating is continued at family, executes step 204.
Step 204, it obtains and corresponds to first application and second application in the pre-set peep-proof pattern Input range.
In this step, the input model of corresponding first application and the second application in the pre-set peep-proof pattern is obtained first It encloses, to carry out using the division and association with its corresponding region.Wherein, which can will be touched for two applications Touch screen be divided into up and down left and right or other specific two parts regions allocation of parameters, by user the peep-proof pattern setting It is set in.
Step 205, according to the input range, the touch screen of the mobile terminal is divided into and first application Corresponding first area and with it is described second apply corresponding second area.
In this step, according to the input range that above-mentioned steps 204 obtain, screen will be touched and divided, two are obtained and answer With corresponding region.In this way, by the region corresponding to user's operation, mobile terminal although it is understood that user institute is to be used Using the specially first application or the second application.
Step 206, the touch operation touched on screen, and the target area occurred according to the touch operation are detected Domain determines intended application corresponding with the target area, and the target area includes first area and second area.
In this step, after the region division that step 205 completes touch screen, it will start and touch behaviour on screen to touching The detection of work, to, after detecting a touch operation, it will be able to according to the touch operation occur target area, determine with The corresponding intended application in the target area.
Step 207, it generates corresponding input according to the touch operation to instruct, and described in the input instructed being sent to Intended application is handled.
In this step, based on the intended application that step 206 determines, corresponding input is generated according to the touch operation and is instructed, And input instruction is sent to intended application and is handled.Wherein, which, then can be directly in response to if the first application Input instruction is handled;And if the second application, then advanced line activating is needed, is then responded again at input instruction Reason.
In this way, 201- steps 207 through the above steps, mobile terminal is needing to start peep-proof pattern according to user, by preventing The target peep-proof display parameters adjustment mobile terminal peeped in pattern corresponds to the display interface of the first application and the second application, and realization is set Fixed blurring effect has carried out peep-proof protection to the individual privacy of user, avoid screen stick on peep-proof film accelerate electricity disappear The generation of consumption.And later, it can will also be touched by the input range of corresponding first application and the second application in the peep-proof pattern that pre-sets It touches screen and carries out corresponding division, and then the target area occurred according to user's touch operation, determine corresponding intended application, with The corresponding input generated according to the touch operation instruction is sent to intended application to handle, reaches the final of user's operation Purpose.In this way, because user by presetting is the application known corresponding to the target area of its touch operation, so being not necessarily to The operation of application can either be continued by exiting the peep-proof pattern, further improved peep-proof effect, also improved system just Victory.
Wherein, step 201 includes:
It is preset to occur in preset peep-proof mode startup operation or present displayed content to detect the operation of user When peep-proof pattern starts word, triggering peep-proof instruction.
Here, user or system can preset peep-proof mode startup operation and/or peep-proof pattern starts word, to move Dynamic terminal the operation detected will be compared with preset peep-proof mode startup operation, or in present displayed content In detect whether there are peep-proof pattern start word, come carry out peep-proof instruction triggering judge, peep-proof is triggered after successful match Instruction, it is automatic to start peep-proof pattern, to improve the intelligence of mobile terminal.The peep-proof mode startup operation is concretely one specific The slide of track such as " U " or " O ", peep-proof pattern starts word, and to be that " readings ", " picture ", " exchange software " etc. are related to hidden Private keyword.Certainly, the triggering of peep-proof instruction is not limited to above two mode, (can also such as be said " anti-by voice Peep "), the triggerings such as virtual key (setting peep-proof start button) or physical button, will not enumerate herein.
In addition, specifically, in this embodiment, the target peep-proof display parameters include:The transparency of interface display;Its In, the transparency of the interface display includes target clear degree and second application interface that first application interface is shown The target clear degree of display.
Here, the transparency for the interface display which includes, has specifically included the first application interface The target clear degree that the target clear degree and the second application interface of display are shown.Preferably, to adapt to the total saturating of interface display Lightness limit value can carry out average value setting, and when such as limit value 1, the target clear degree of the first application is 0.5, second in the transparency The target clear degree of application is also 0.5, after peep-proof pattern starts, according to the two target clear degree respectively to the boundary of the first application Face and the interface of the second application carry out display setting, and mobile terminal will finally show the vague interface after two interfaces superpositions.When So, which is not limited to transparency this parameter, further includes the parameters such as brightness, aberration, colour temperature, differs herein One enumerates.
It should be appreciated that in this embodiment, the concrete numerical value of each parameter of the final display interface of peep-proof pattern is not only It is limited to the predetermined distribution of system, to ensure that interface display adapts to the requirement of user, further, in step 202, obtains institute Stating the step of correspondence first in peep-proof pattern applies the target peep-proof display parameters with the second application includes:
It applies, the number of starts in the application attribute and preset time of second application, determines according to described first The peep-proof priority of first application and second application;
According to the peep-proof priority, by the application of peep-proof highest priority in first application and second application Peep-proof display parameters as target peep-proof display parameters.
It is found that in the embodiment, user is capable of the peep-proof display parameters of self-defined application, so starting peep-proof pattern When, target peep-proof display parameters at this time are first determined, specifically, mobile terminal can be according to the application attribute of two applications and pre- If the number of starts in the period determines its corresponding peep-proof priority, as the peep-proof priority of Bank application is higher than immediately The peep-proof priority of communications applications, but when application attribute is identical, also need to combine the number of starts in preset time, to The use habit of user can be preferably corresponded to, later, according to the peep-proof priority of application, with highest peep-proof priority application Peep-proof display parameters are target peep-proof display parameters.
If user sets the transparency of Mobile banking as 0.4, the transparency of wechat is 0.8, and under peep-proof pattern, two thoroughly The total value of lightness is more than 1, has exceeded total transparency limit value of interface display, so, according to the method described above, it is based on Mobile banking Peep-proof priority be higher than wechat, final it is confirmed that the transparency of Mobile banking is 0.4, the transparency 1-0.4=of wechat 0.6, rather than 0.8.Which can also be used to determine the correspondence parameter of final display interface in other types parameter.
It is appreciated that in the above content, end interface is carried out after blurring shows, pre-set peep-proof can be based on Input range is divided to touching screen in pattern, and determines that user's input is corresponding by touch operation of the user on touching screen Intended application.Wherein, for different types of touch operation, in the method for the embodiment of the present invention, in step 206, according to described Touch operation occur target area, determine intended application corresponding with the target area the step of include:
If the touch operation is clicking operation, the target area that the clicking operation occurs is obtained, is determined and the mesh Mark the corresponding intended application in region;
If the touch operation is slide, the target area where the starting point of the slide is obtained, is determined Intended application corresponding with the target area.
In this way, detect clicking operation of the user to touch screen, the target that can be occurred by understanding the clicking operation Region, to using the application corresponding to the target area as intended application.And since slide trans-regional may occur, Therefore user can be based on and slide custom, the target area where the starting point of the slide is preferably obtained, with the target area institute Corresponding application is as intended application.Can naturally also it be arranged using the region where the end point of slide as target area Domain.
Such as need to carry out the scene of mobile terminal payment, user to enter password after starting Mobile banking in public places Input interface does not remove input password, but (Mobile banking enters running background shape to deactivation another application such as browser State), and trigger peep-proof instruction.In this way, applying the mobile terminal of second embodiment of the invention, the anti-of user's triggering is being determined It can start peep-proof pattern after peeping instruction, and obtain and correspond to browser (first apply) and Mobile banking (the in the peep-proof pattern Two application) target peep-proof display parameters, later will be based on the target peep-proof display parameters, complete browser interface and mobile phone silver The blurring of row interface for password input is shown.Then, can also screen will be touched by the input range in the peep-proof pattern that pre-sets Two different zones of corresponding Mobile banking and browser are divided into, finally, after user clicks Mobile banking corresponding region, root Corresponding input instruction is generated according to clicking operation and is sent to Mobile banking, and Activate Phone bank, and regard input number as password It is handled, reaches the final purpose of user's operation.
In this scenario, browser interface be for protecting Mobile banking interface, therefore, after starting peep-proof pattern, According to the target peep-proof display parameters of acquisition, when adjusting interface display of the browser with the Mobile banking, to reach more preferably Effect optionally first the interface size based on the Mobile banking in running background, adaptation can adjust the current interface of browser Size, two interfaces are completely overlapped, and then joined to adjust the display after the overlapping of interface by the target peep-proof display parameters Number, reaches scheduled blurring effect, realizes the purpose of peep-proof.
Certainly, the size of the second application interface is specifically adjusted based on the size of the first application interface, or with The size of the first application interface is adjusted based on the size of second application interface, can be based on itself in peep-proof pattern by user Operating habit pre-sets content to determine, is not limited to above-mentioned realization method.
In conclusion the method for second embodiment of the invention answers user demand to start anti-in the peep-proof instruction for determining triggering After peeping pattern, the last application being activated in foreground application and background application can be corresponded in the peep-proof pattern by obtaining Target peep-proof display parameters realize the blurring of mobile terminal screen display interface to adjust the interface display of the two applications Effect, other staff can not both see the particular content that mobile terminal screen is shown clearly, also can not for the subsequent input of user Its specific purposes is solved, protects the privacy of user, and because user by presetting is the target for knowing its touch operation Application corresponding to region, so the operation of application can either be continued without exiting the peep-proof pattern, further promoted Peep-proof effect, also improves the convenience of system.Without sticking on peep-proof film in screen, and then the acceleration for avoiding electricity disappears Consumption.
3rd embodiment
Fig. 3 is the block diagram of the mobile terminal of one embodiment of the invention.Mobile terminal 300 shown in Fig. 3 includes determining mould Block 301, first processing module 302 and adjustment module 303.
Determining module 301, the peep-proof instruction for determining triggering;
First processing module 302 starts peep-proof pattern, and obtain the peep-proof pattern for being instructed according to the peep-proof The target peep-proof display parameters of the application of middle correspondence first and the second application;Wherein, first application is foreground application, described the Two applications are the last application being activated in background application, and the target peep-proof display parameters, which are used for characterizing described first, answers With the display parameters after the interface overlapping with second application;
Module 303 is adjusted, for according to the target peep-proof display parameters, adjustment first application and described second to be answered Display interface.
On the basis of Fig. 3, optionally, as shown in figure 4, the mobile terminal 300 further includes:
Acquisition module 304 corresponds to first application and described for obtaining in the pre-set peep-proof pattern The input range of two applications;
Division module 305, for according to the input range, by the touch screen of the mobile terminal be divided into it is corresponding Described first applies corresponding second area using corresponding first area and with described second;
Second processing module 306 for detecting the touch operation on the touch screen, and is sent out according to the touch operation Raw target area determines intended application corresponding with the target area, and the target area includes first area and second Region;
Third processing module 307 is instructed for generating corresponding input according to the touch operation, and the input is referred to Order is sent to the intended application and is handled.
Optionally, the Second processing module 306 includes:
First processing submodule 3061 obtains the clicking operation and occurs if being clicking operation for the touch operation Target area, determine corresponding with target area intended application;
Second processing submodule 3062 obtains rising for the slide if being slide for the touch operation Target area where initial point determines intended application corresponding with the target area.
On the basis of Fig. 3, optionally, as shown in figure 5, the first processing module 302 includes:
Determination sub-module 3021, for according to it is described first apply, it is described second application application attribute and it is default when The interior number of starts determines the peep-proof priority of first application and second application;
Third handles submodule 3022, for according to the peep-proof priority, first application and described second to be answered Use the peep-proof display parameters of the application of middle peep-proof highest priority as target peep-proof display parameters.
Optionally, the determining module is further used for detecting that the operation of user is preset peep-proof mode startup operation Or when occurring preset peep-proof pattern startup word in present displayed content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Mobile terminal 300 can realize each process that mobile terminal is realized in the embodiment of the method for Fig. 1 and Fig. 2, to keep away Exempt to repeat, which is not described herein again.Mobile terminal 300 will answer user demand to start after determining the peep-proof instruction of user's triggering Peep-proof pattern corresponds in foreground application and background application the last application two being activated and answers by obtaining in the peep-proof pattern Target peep-proof display parameters, to adjust the display interface of the two applications, since the target peep-proof display parameters are characterizations Therefore display parameters after the interface overlapping of the two applications can realize the mould of mobile terminal screen display interface after the adjustment Pasting effect has carried out peep-proof protection to the individual privacy of user, just without sticking on peep-proof film in screen, and then avoids electricity Acceleration consumption.
Fourth embodiment
Fig. 6 is the block diagram of the mobile terminal of another embodiment of the present invention.Mobile terminal 600 shown in fig. 6 includes:At least One processor 601, memory 602, at least one network interface 604 and user interface 603.It is each in mobile terminal 600 Component is coupled by bus system 605.It is understood that bus system 605 is logical for realizing the connection between these components Letter.Bus system 605 further includes power bus, controlling bus and status signal bus in addition in addition to including data/address bus.But it is For the sake of clear explanation, in figure 6 various buses are all designated as bus system 605.
Wherein, user interface 603 may include display, keyboard or pointing device (for example, mouse, trace ball (trackball), touch-sensitive plate or touch screen etc..
It is appreciated that the memory 602 in the embodiment of the present invention can be volatile memory or nonvolatile memory, Both or may include volatile and non-volatile memory.Wherein, nonvolatile memory can be read-only memory (Read- Only Memory, ROM), programmable read only memory (Programmable ROM, PROM), the read-only storage of erasable programmable Device (Erasable PROM, EPROM), electrically erasable programmable read-only memory (Electrically EPROM, EEPROM) or Flash memory.Volatile memory can be random access memory (Random Access Memory, RAM), be used as external high Speed caching.By exemplary but be not restricted explanation, the RAM of many forms is available, such as static RAM (Static RAM, SRAM), dynamic random access memory (Dynamic RAM, DRAM), Synchronous Dynamic Random Access Memory (Synchronous DRAM, SDRAM), double data speed synchronous dynamic RAM (Double Data Rate SDRAM, DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced SDRAM, ESDRAM), synchronized links Dynamic random access memory (Synch link DRAM, SLDRAM) and direct rambus random access memory (Direct Rambus RAM, DRRAM).The memory 602 of system and method described herein be intended to including but not limited to these and it is arbitrary its It is suitble to the memory of type.
In some embodiments, memory 602 stores following element, executable modules or data structures, or Their subset of person or their superset:Operating system 6021 and application program 6022.
Wherein, operating system 6021, including various system programs, such as ccf layer, core library layer, driving layer etc., are used for Realize various basic businesses and the hardware based task of processing.Application program 6022, including various application programs, such as media Player (Media Player), browser (Browser) etc., for realizing various applied business.Realize the embodiment of the present invention The program of method may be embodied in application program 6022.
In embodiments of the present invention, by the program for calling memory 602 to store or instruction, specifically, can be application The program stored in program 6022 or instruction, processor 601 are used for:Determine the peep-proof instruction of triggering;It is instructed according to the peep-proof, Start peep-proof pattern, and obtains the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Its In, first application is foreground application, and second application is the last application being activated, the mesh in background application Mark peep-proof display parameters are used for characterizing the display parameters after the interface overlapping of first application and second application;According to institute State target peep-proof display parameters, the display interface of adjustment first application and second application.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601. Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 601 or the instruction of software form.Above-mentioned processing Device 601 can be general processor, digital signal processor (Digital Signal Processor, DSP), special integrated electricity Road (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, Discrete hardware components.It may be implemented or execute disclosed each method, step and the logic diagram in the embodiment of the present invention.It is general Processor can be microprocessor or the processor can also be any conventional processor etc..In conjunction with institute of the embodiment of the present invention The step of disclosed method, can be embodied directly in hardware decoding processor and execute completion, or with the hardware in decoding processor And software module combination executes completion.Software module can be located at random access memory, and flash memory, read-only memory may be programmed read-only In the storage medium of this fields such as memory or electrically erasable programmable memory, register maturation.The storage medium is located at The step of memory 602, processor 601 reads the information in memory 602, the above method is completed in conjunction with its hardware.
It is understood that embodiments described herein can use hardware, software, firmware, middleware, microcode or its It combines to realize.For hardware realization, processing unit may be implemented in one or more application-specific integrated circuit (Application Specific Integrated Circuits, ASIC), digital signal processor (Digital Signal Processing, DSP), digital signal processing appts (DSP Device, DSPD), programmable logic device (Programmable Logic Device, PLD), field programmable gate array (Field-Programmable Gate Array, FPGA), general processor, In controller, microcontroller, microprocessor, other electronic units for executing herein described function or combinations thereof.
For software implementations, it can be realized herein by executing the module (such as process, function etc.) of function described herein The technology.Software code is storable in memory and is executed by processor.Memory can in the processor or It is realized outside processor.
Optionally, processor 601 is additionally operable to:Obtain corresponded in the pre-set peep-proof pattern it is described first application and The input range of second application;According to the input range, the touch screen of mobile terminal is divided into and institute by described It states the first corresponding first area of application and applies corresponding second area with described second;Detect touching on the touch screen Operation, and the target area occurred according to the touch operation are touched, determines intended application corresponding with the target area, it is described Target area includes first area and second area;Corresponding input instruction is generated according to the touch operation, and will be described defeated Enter instruction and be sent to the intended application to be handled.
Optionally, processor 601 is additionally operable to:If the touch operation is clicking operation, obtains the clicking operation and occur Target area, determine corresponding with target area intended application;If the touch operation is slide, described in acquisition Target area where the starting point of slide determines intended application corresponding with the target area.
Optionally, as another embodiment, processor 601 is additionally operable to:It is applied according to described first, second application Application attribute and preset time in the number of starts, determine it is described first application and it is described second application peep-proof it is preferential Grade;According to the peep-proof priority, the application of peep-proof highest priority is anti-during first application and described second are applied Display parameters are peeped as target peep-proof display parameters.
Optionally, processor 601 is additionally operable to:Detect that the operation of user is preset peep-proof mode startup operation or works as When occurring preset peep-proof pattern startup word in preceding display content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Mobile terminal 600 can realize each process that mobile terminal is realized in previous embodiment, to avoid repeating, here It repeats no more.Mobile terminal 600 will answer user demand to start peep-proof pattern, by obtaining after determining the peep-proof instruction of triggering Take the target peep-proof for corresponding to the last application of application two being activated in foreground application and background application in the peep-proof pattern aobvious Show parameter, to adjust the display interface of the two applications, since the target peep-proof display parameters are the boundaries for characterizing the two applications Therefore display parameters after the overlapping of face can realize the blurring effect of mobile terminal screen display interface, to user after the adjustment Individual privacy carried out peep-proof protection, just without in screen sticking on peep-proof film, and then avoid the acceleration consumption of electricity.
5th embodiment
Fig. 7 is the structural schematic diagram of the mobile terminal of another embodiment of the present invention.Specifically, the mobile terminal in Fig. 7 700 can be mobile phone, tablet computer, personal digital assistant (Personal Digital Assistant, PDA) or vehicle mounted electric Brain etc..
Mobile terminal 700 in Fig. 7 includes radio frequency (Radio Frequency, RF) circuit 710, memory 720, input Unit 730, display unit 740, processor 760, voicefrequency circuit 770, WiFi (Wireless Fidelity) modules 780 and electricity Source 790.
Wherein, input unit 730 can be used for receiving number input by user or character information, and generation and mobile terminal The 700 related signal input of user setting and function control.Specifically, in the embodiment of the present invention, which can To include touch panel 731.Touch panel 731, also referred to as touch screen collect user on it or neighbouring touch operation (for example user uses the operations of any suitable object or attachment on touch panel 731 such as finger, stylus), and according to advance The formula of setting drives corresponding attachment device.Optionally, touch panel 731 may include touch detecting apparatus and touch controller Two parts.Wherein, the touch orientation of touch detecting apparatus detection user, and the signal that touch operation is brought is detected, by signal Send touch controller to;Touch controller receives touch information from touch detecting apparatus, and is converted into contact coordinate, The processor 760 is given again, and can be received order that processor 760 is sent and be executed.Furthermore, it is possible to using resistance-type, The multiple types such as condenser type, infrared ray and surface acoustic wave realize touch panel 731.In addition to touch panel 731, input unit 730 can also include other input equipments 732, other input equipments 732 can include but is not limited to physical keyboard, function key It is one or more in (such as volume control button, switch key etc.), trace ball, mouse, operating lever etc..
Wherein, display unit 740 can be used for showing information input by user or be supplied to information and the movement of user The various menu interfaces of terminal 700.Display unit 740 may include display panel 741, optionally, LCD or organic hairs may be used The forms such as optical diode (Organic Light-Emitting Diode, OLED) configure display panel 741.
It should be noted that touch panel 731 can cover display panel 741, touch display screen is formed, when the touch display screen is examined It measures and sends processor 760 on it or after neighbouring touch operation to determine the type of touch event, be followed by subsequent processing device 760 provide corresponding visual output according to the type of touch event in touch display screen.
Touch display screen includes Application Program Interface viewing area and common control viewing area.The Application Program Interface viewing area And arrangement mode of the common control viewing area does not limit, can be arranged above and below, left-right situs etc. can distinguish two it is aobvious Show the arrangement mode in area.The Application Program Interface viewing area is displayed for the interface of application program.Each interface can be with Including the interface elements such as icon and/or widget desktop controls of at least one application program.The Application Program Interface viewing area Or the empty interface not comprising any content.This commonly uses control viewing area for showing the higher control of utilization rate, for example, Application icons such as button, interface number, scroll bar, phone directory icon etc. are set.
Wherein processor 760 is the control centre of mobile terminal 700, utilizes various interfaces and connection whole mobile phone Various pieces, by running or executing the software program and/or module that are stored in first memory 721, and calling storage Data in second memory 722 execute the various functions and processing data of mobile terminal 700, to mobile terminal 700 Carry out integral monitoring.Optionally, processor 760 may include one or more processing units.
In embodiments of the present invention, by calling store the first memory 721 in software program and/or module and/ Or the data in the second memory 722, peep-proof instruction of the processor 760 for determining triggering;It is instructed, is opened according to the peep-proof Dynamic peep-proof pattern, and obtain the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Wherein, First application is foreground application, and second application is the last application being activated, the target in background application Peep-proof display parameters are used for characterizing the display parameters after the interface overlapping of first application and second application;According to described Target peep-proof display parameters, the display interface of adjustment first application and second application.
Optionally, processor 760 corresponds to first application and institute for obtaining in the pre-set peep-proof pattern State the input range arrange parameter of the second application;According to the input range, the touch screen of the mobile terminal is divided into And described first applies corresponding second area using corresponding first area and with described second;It detects on the touch screen Touch operation, and the target area occurred according to the touch operation determines corresponding with target area intended application, The target area includes first area and second area;Corresponding input is generated according to the touch operation to instruct, and by institute Input instruction is stated to be sent to the intended application and handled.
Optionally, if it is clicking operation that processor 760, which is used for the touch operation, the mesh that the clicking operation occurs is obtained Region is marked, determines intended application corresponding with the target area;If the touch operation is slide, the sliding is obtained Target area where the starting point of operation determines intended application corresponding with the target area.
Optionally, processor 760 be used for according to it is described first apply, it is described second application application attribute and it is default when The interior number of starts determines the peep-proof priority of first application and second application;According to the peep-proof priority, Using the peep-proof display parameters of the application of peep-proof highest priority in first application and second application as target peep-proof Display parameters.
Optionally, processor 760 is used to detect that the operation of user to be preset peep-proof mode startup operation or current When occurring preset peep-proof pattern startup word in display content, triggering peep-proof instruction.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
As it can be seen that mobile terminal 700 will answer user demand to start peep-proof pattern after determining the peep-proof instruction of triggering, lead to It crosses and obtains that correspond in foreground application and background application the target that the last application two being activated is applied in the peep-proof pattern anti- Display parameters are peeped, to adjust the display interface of the two applications, since the target peep-proof display parameters are the two applications of characterization Interface overlapping after display parameters therefore can realize the blurring effect of mobile terminal screen display interface after the adjustment, it is right The individual privacy of user has carried out peep-proof protection, just without sticking on peep-proof film in screen, and then avoids the acceleration consumption of electricity.
Sixth embodiment
The embodiments of the present invention also provide a kind of computer readable storage mediums, are stored thereon with computer program, should Following steps are realized when program is executed by processor:Determine the peep-proof instruction of triggering;It is instructed according to the peep-proof, starts peep-proof mould Formula, and obtain the target peep-proof display parameters of corresponding first application and the second application in the peep-proof pattern;Wherein, described first It is shown using for the last application being activated, the target peep-proof in background application using for foreground application, described second Parameter is used for characterizing the display parameters after the interface overlapping of first application and second application;According to the target peep-proof Display parameters, the display interface of adjustment first application and second application.
Optionally, following steps can also be realized when which is executed by processor:Obtain the pre-set peep-proof The input range of first application and second application is corresponded in pattern;It, will be described mobile whole according to the input range The touch screen at end is divided into and described first applies corresponding second area using corresponding first area and with described second; The touch operation on the touch screen, and the target area occurred according to the touch operation are detected, is determined and the target The corresponding intended application in region, the target area include first area and second area;According to touch operation generation pair The input instruction answered, and input instruction is sent to the intended application and is handled.
Optionally, following steps can also be realized when which is executed by processor:If the touch operation is to click to grasp Make, obtain the target area that the clicking operation occurs, determines intended application corresponding with the target area;If the touch Operation is slide, obtains the target area where the starting point of the slide, and determination is corresponding with the target area Intended application.
Optionally, following steps can also be realized when which is executed by processor:Applied according to described first, described the The number of starts in the application attribute and preset time of two applications determines the peep-proof of first application and second application Priority;According to the peep-proof priority, by the application of peep-proof highest priority in first application and second application Peep-proof display parameters as target peep-proof display parameters.
Optionally, following steps can also be realized when which is executed by processor:Detect that the operation of user is default Peep-proof mode startup operation or present displayed content in when there is preset peep-proof pattern and starting word, triggering peep-proof refers to It enables.
Optionally, the target peep-proof display parameters include:The transparency of interface display;Wherein, the interface display Transparency includes the target clear degree that the target clear degree that first application interface is shown and second application interface are shown.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
Those of ordinary skill in the art may realize that lists described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and algorithm steps can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, depends on the specific application and design constraint of technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The scope of the present invention.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In embodiment provided herein, it should be understood that disclosed device and method can pass through others Mode is realized.For example, the apparatus embodiments described above are merely exemplary, for example, the division of the unit, only A kind of division of logic function, formula that in actual implementation, there may be another division manner, such as multiple units or component can combine or Person is desirably integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Between coupling, direct-coupling or communication connection can be INDIRECT COUPLING or communication link by some interfaces, device or unit It connects, can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in a computer read/write memory medium.Based on this understanding, technical scheme of the present invention is substantially in other words The part of the part that contributes to existing technology or the technical solution can be expressed in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be People's computer, server or network equipment etc.) it performs all or part of the steps of the method described in the various embodiments of the present invention. And storage medium above-mentioned includes:USB flash disk, mobile hard disk, ROM, RAM, magnetic disc or CD etc. are various can to store program code Medium.
The above description is merely a specific embodiment, but scope of protection of the present invention is not limited thereto, any Those familiar with the art in the technical scope disclosed by the present invention, can easily think of the change or the replacement, and should all contain Lid is within protection scope of the present invention.Therefore, protection scope of the present invention should be subject to the protection scope in claims.
Explanation is needed further exist for, this mobile terminal described in this description includes but not limited to smart mobile phone, puts down Plate computer etc..
This many functional component described in this description is all referred to as module, specifically to emphasize its realization side The independence of formula.
In the embodiment of the present invention, module can use software realization, to be executed by various types of processors.Citing comes It says, the executable code module of a mark may include the one or more physics or logical block of computer instruction, citing For, object, process or function can be built as.Nevertheless, the executable code of institute's mark module is without physically It is located together, but may include the different instructions being stored in different positions, be combined together when in these command logics When, it constitutes module and realizes the regulation purpose of the module.
In fact, executable code module can be the either many item instructions of individual instructions, and can even be distributed It on multiple and different code segments, is distributed in distinct program, and is distributed across multiple memory devices.Similarly, it grasps Making data can be identified in module, and can be realized according to any form appropriate and be organized in any appropriate class In the data structure of type.The operation data can be collected as individual data collection, or can be distributed on different location (including in different storage device), and can only be present in system or network as electronic signal at least partly.
When module can utilize software realization, it is contemplated that the level of existing hardware technique, it is possible to implemented in software Module, in the case where not considering cost, those skilled in the art can build corresponding hardware circuit to realize correspondence Function, the hardware circuit includes conventional ultra-large integrated (VLSI) circuit or gate array and such as logic core The existing semiconductor of piece, transistor etc either other discrete elements.Module can also use programmable hardware device, such as The realizations such as field programmable gate array, programmable logic array, programmable logic device.
Above-mentioned exemplary embodiment is described with reference to those attached drawings, many different forms and embodiment be it is feasible and Without departing from spirit of that invention and teaching, therefore, the present invention should not be construed as in the limitation of this proposed exemplary embodiment. More precisely, these exemplary embodiments are provided so that the present invention can be perfect and complete, and can be by the scope of the invention It is communicated to those those of skill in the art.In those schemas, size of components and relative size be perhaps based on it is clear for the sake of And it is exaggerated.Term used herein is based only on description particular example embodiment purpose, and being not intended to, which becomes limitation, uses.Such as Ground is used at this, unless the interior text clearly refers else, otherwise the singulative " one ", "one" and "the" be intended to by Those multiple forms are also included in.Those term "comprising"s and/or " comprising " will become further apparent when being used in this specification, It indicates the presence of the feature, integer, step, operation, component and/or component, but is not excluded for one or more other features, whole Number, step, operation, component, component and/or the presence of its group or increase.Unless otherwise indicated, narrative tense, a value range packet Bound containing the range and any subrange therebetween.
The above is the preferred embodiment of the present invention, it is noted that for those skilled in the art For, without departing from the principles of the present invention, it can also make several improvements and retouch, these improvements and modifications It should be regarded as protection scope of the present invention.

Claims (10)

1. a kind of terminal interface display methods is applied to mobile terminal, which is characterized in that including:
Determine the peep-proof instruction of triggering;
It is instructed according to the peep-proof, starts peep-proof pattern, and obtain corresponding first application and the second application in the peep-proof pattern Target peep-proof display parameters;Wherein, first application is foreground application, and second application is nearest one in background application The secondary application being activated, the target peep-proof display parameters are used for characterizing the interface weight of first application and second application The display parameters of poststack;
According to the target peep-proof display parameters, the display interface of adjustment first application and second application;Wherein,
After the interface display for adjusting first application and second application, the method further includes:
Obtain the input range that first application and second application are corresponded in the pre-set peep-proof pattern;
According to the input range, the touch screen of the mobile terminal is divided into and applies corresponding firstth area with described first Domain and with it is described second apply corresponding second area;
Detect it is described touch screen on touch operation, and according to the touch operation occur target area, determine with it is described The corresponding intended application in target area, the target area include first area and second area;
Corresponding input instruction is generated according to the touch operation, and input instruction is sent to the intended application and is carried out Processing.
2. terminal interface display methods according to claim 1, which is characterized in that the mesh occurred according to the touch operation Mark region, determine intended application corresponding with the target area the step of include:
If the touch operation is clicking operation, the target area that the clicking operation occurs is obtained, is determined and the target area The corresponding intended application in domain;
If the touch operation is slide, the target area where the starting point of the slide, determining and institute are obtained State the corresponding intended application in target area.
3. terminal interface display methods according to claim 1, which is characterized in that obtain in the peep-proof pattern corresponding the One includes the step of applying the target peep-proof display parameters with the second application:
It is applied according to described first, the number of starts in the application attribute and preset time of second application, described in determination The peep-proof priority of first application and second application;
According to the peep-proof priority, the application of peep-proof highest priority is anti-during first application and described second are applied Display parameters are peeped as target peep-proof display parameters.
4. terminal interface display methods according to claim 1, which is characterized in that the step of determining the peep-proof instruction of triggering Including:
Detect that the operation of user is preset peep-proof occur in preset peep-proof mode startup operation or present displayed content When pattern starts word, triggering peep-proof instruction.
5. terminal interface display methods according to claim 3, which is characterized in that the target peep-proof display parameters packet It includes:The transparency of interface display;Wherein, the transparency of the interface display includes that the target that shows of first application interface is saturating The target clear degree that lightness and second application interface are shown.
6. a kind of mobile terminal, which is characterized in that including:
Determining module, the peep-proof instruction for determining triggering;
First processing module starts peep-proof pattern for being instructed according to the peep-proof, and obtains in the peep-proof pattern corresponding the The target peep-proof display parameters of one application and the second application;Wherein, first application is foreground application, and second application is The last application being activated in background application, the target peep-proof display parameters are used for characterizing first application and described Display parameters after the interface overlapping of second application;
Module is adjusted, for according to the target peep-proof display parameters, adjustment first application to be aobvious with second application Show interface;
Acquisition module corresponds to first application and second application for obtaining in the pre-set peep-proof pattern Input range;
Division module, for according to the input range, the touch screen of the mobile terminal being divided into and is answered with described first Corresponding second area is applied with corresponding first area and with described second;
Second processing module, for detecting the touch operation on the touch screen, and the mesh occurred according to the touch operation Region is marked, determines intended application corresponding with the target area, the target area includes first area and second area;
Third processing module instructs for generating corresponding input according to the touch operation, and the input is instructed and is sent It is handled to the intended application.
7. mobile terminal according to claim 6, which is characterized in that the Second processing module includes:
First processing submodule obtains the target area that the clicking operation occurs if being clicking operation for the touch operation Domain determines intended application corresponding with the target area;
Second processing submodule, if being slide for the touch operation, where the starting point for obtaining the slide Target area, determine corresponding with target area intended application.
8. mobile terminal according to claim 6, which is characterized in that the first processing module includes:
Determination sub-module, for opening in the application attribute and preset time according to first application, second application Dynamic number determines the peep-proof priority of first application and second application;
Third handles submodule, is used for according to the peep-proof priority, by peep-proof in first application and second application The peep-proof display parameters of the application of highest priority are as target peep-proof display parameters.
9. mobile terminal according to claim 6, which is characterized in that the determining module is further used for detecting user Operation be when occurring preset peep-proof pattern in preset peep-proof mode startup operation or present displayed content to start word, Trigger peep-proof instruction.
10. mobile terminal according to claim 8, which is characterized in that the target peep-proof display parameters include:Interface is aobvious The transparency shown;Wherein, the transparency of the interface display includes the target clear degree and institute that first application interface is shown State the target clear degree that the second application interface is shown.
CN201710191969.5A 2017-03-28 2017-03-28 A kind of terminal interface display methods and mobile terminal Active CN106971123B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710191969.5A CN106971123B (en) 2017-03-28 2017-03-28 A kind of terminal interface display methods and mobile terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710191969.5A CN106971123B (en) 2017-03-28 2017-03-28 A kind of terminal interface display methods and mobile terminal

Publications (2)

Publication Number Publication Date
CN106971123A CN106971123A (en) 2017-07-21
CN106971123B true CN106971123B (en) 2018-09-04

Family

ID=59335651

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710191969.5A Active CN106971123B (en) 2017-03-28 2017-03-28 A kind of terminal interface display methods and mobile terminal

Country Status (1)

Country Link
CN (1) CN106971123B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022169445A1 (en) * 2021-02-03 2022-08-11 Google Llc Preventing user interaction hijacking attacks by blocking interactions with obscured components

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109086103B (en) * 2018-08-02 2021-08-24 Oppo广东移动通信有限公司 Application display method and device, storage medium and electronic equipment

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102332075A (en) * 2010-07-12 2012-01-25 英业达股份有限公司 Anti-peeking system and method
CN103327164B (en) * 2012-03-23 2016-03-30 宇龙计算机通信科技(深圳)有限公司 The peep-proof method of mobile terminal and this mobile terminal
CN103077361B (en) * 2012-12-28 2016-05-04 东莞宇龙通信科技有限公司 Mobile terminal and peep-proof method thereof
CN105094724B (en) * 2014-05-12 2019-04-12 宇龙计算机通信科技(深圳)有限公司 The control device that the control method and screen that screen is shown are shown

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2022169445A1 (en) * 2021-02-03 2022-08-11 Google Llc Preventing user interaction hijacking attacks by blocking interactions with obscured components

Also Published As

Publication number Publication date
CN106971123A (en) 2017-07-21

Similar Documents

Publication Publication Date Title
CN106844067B (en) A kind of processing method and mobile terminal of content
US10509551B2 (en) Icon management method, apparatus, and terminal
CN107340948B (en) A kind of video playing control method and mobile terminal
CN106127076B (en) A kind of inspection method and mobile terminal of photograph album photo
CN106648382B (en) A kind of picture browsing method and mobile terminal
CN104063114B (en) A kind of control method of communication terminal, control device and communication terminal
CN106843654A (en) The method and mobile terminal of a kind of terminal multi-job operation
CN106057169B (en) A kind of eye care method and mobile terminal of mobile terminal
EP3425490A1 (en) Human-machine interface method, device and graphical user interface
CN106325465B (en) A kind of control method that screen is shown and mobile terminal
CN106959864A (en) A kind of adjusting method and mobile terminal of interface display effect
CN107193482A (en) The operating method and mobile terminal of a kind of mobile terminal screen
CN107679426A (en) A kind of screen content display method thereof and mobile terminal
CN106250021A (en) A kind of control method taken pictures and mobile terminal
CN107608591A (en) The display methods and mobile terminal of a kind of virtual key
US11568033B2 (en) Data encryption or decryption method and apparatus, and terminal device
CN107506637A (en) Information displaying method and device, terminal and readable storage medium storing program for executing
CN106971123B (en) A kind of terminal interface display methods and mobile terminal
CN106325753A (en) Payment interface display method and mobile terminal
CN106203061A (en) The encryption method of a kind of application program and mobile terminal
CN106354373A (en) Icon moving method and mobile terminal
CN106648857A (en) Method for starting OTG function of mobile terminal and mobile terminal
CN109803166A (en) For showing the method and apparatus of small video in the locking screen interface of user equipment
CN106874046A (en) The operating method and mobile terminal of a kind of application program
CN107085508A (en) A kind of information processing method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20171107

Address after: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Applicant after: VIVO MOBILE COMMUNICATION CO., LTD.

Applicant after: Wewo Mobile Communication Co. Ltd. Beijing branch

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Applicant before: VIVO MOBILE COMMUNICATION CO., LTD.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20200522

Address after: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Patentee after: VIVO MOBILE COMMUNICATION Co.,Ltd.

Address before: 283 No. 523860 Guangdong province Dongguan city Changan town usha BBK Avenue

Co-patentee before: Wewo Mobile Communication Co. Ltd. Beijing branch

Patentee before: VIVO MOBILE COMMUNICATION Co.,Ltd.

TR01 Transfer of patent right